Twin K-Shuffle Based Audio Steganography
Keywords:Steganography, K-Shuffle, Bit-Shuffling, Secret Message, Cover Audio, Stego Audio, Embedding Function, Extraction Function
Secure communication is most effective when it is covert. In the realm of covert communication, steganography conceals secret message within a cover medium. This ensures that adversaries who have access to this carrier medium are unaware of the existence of the secret message. This paper proposes a novel twin K-Shuffling and embedding technique that scrambles and hides secret message inside audio samples. The scrambling phase of the proposed technique consists of bit and character shuffling. The bit-shuffling scrambles the bit-string of each character in the secret message into cipher-text via K-Shuffle. The characters of the resulting cipher-text are then shuffled by another K-Shuffle technique to yield chaotic cipher-text. At the embedding phase, the scrambled cipher-text is randomly planted into the carrier audio samples. The novelty in this proposed technique is the provision of a three-layer protection for secret messages; bit, character, and encoding layers. Results and analyses show that this technique satisfied both embedding and encryption requirements of steganographic systems.
R. Manisha, and T. Manisha, “Genetic algorithm in audio steganography,” ArXiv: abs/1407.2729, Vol. 13, No. 1, pp. 29-34, 2014.
N. Cvejic, and T. Seppanen, “Increasing the capacity of LSB-based audio steganography,” 2002 IEEE Workshop on Multimedia Signal Processing, St. Thomas, VI, USA, 2002. [Online]. Available: https://doi.org/10.1109/MMSP.2002.1203314
A. Koyun, and H. B. Macit, “Generating a stego-audio data using LSB technique and robustness test,” Journal of Engineering Sciences and Design, Vol. 6, No. 1, pp. 87-92, 2018.
K. Bhowal, D. Bhattacharyya, A. J. Pal, and T. H. Kim, “A GA based audio steganography with enhanced security,” Telecommunication Systems, Vol. 52, No. 4, pp. 2197-2204, 2011.
K. Bhowal, A. J. Pal, G. S. Tomar, and P. P. Sarkar, “Audio steganography using GA,” 2010 International Conference on Computational Intelligence and Communication Networks, 2010. [Online]. Available: https://doi.org/10.1109/CICN.2010.91
K. M. Christine, “Genetic algorithm based model in text steganography,” The African Journal of Information Systems, Vol. 5, No. 4, pp. 131-144, 2013.
B. A. Mitras, and N. F. H. al-Alusi, “Using hybird genetic algorithm in audio steganography,” Iraqi Journal of Statistical Sciences, Vol. 13, No. 25, pp. 150-164, 2013.
C. C. Sobin, and V. M. Manikandan “A Secure Audio Steganography Scheme using Genetic Algorithm,” 5th Proceedings of the IEEE International Conference Image Information Processing, ICIIP 2019, pp. 403-407, 2019.
S. F. Sultana, and D. C. Shubhangi, “Video encryption algorithm and key management using perfect shuffle,” Int. Journal of Engineering Research and Application, Vol. 7, No. 7, pp. 01-05, 2017.
S. Alhassan, M. M. Iddrisu, and M. I. Daabo, “Securing audio data using K-shuffle technique,” Multimedia Tools and Applications, Vol. 78, No. 23, pp. 33985-33997, 2019.
R. W. Packard, and E. S. Packard, “The Order of a perfect k-shuffle,” The Official Journal of the Fibonacci Association, pp. 136-44, 1994.
D. Persi, R. L. Graham, and W. M. Kantor, “The Mathematics of Perfect Shuffles,” Advance in Applied Mathematics, Vol. 4, pp. 175-196, 1983.
I. Z. Alhassan, E. D. Ansong, G. Abdul-Salaam, and S. Alhassan, “Enhancing image security during transmission using residue number system and K-shuffle,” Earthline Journal of Mathematical Sciences, Vol. 4, No. 2, pp. 399-424, 2020.
R. Kaur, J. Bhatia, H. S. Saini, and R. Kumar, “Multilevel Technique to Improve PSNR and MSE in Audio Steganography,” International Journal of Computer Applications, Vol. 103, pp. 1-4, 2014.
Z. Wang and A. C. Bovik, “Mean Squared Error: Love It or Leave It?”, IEEE Signal Processing Magazine, 2009. [Online]. Available: https://doi.org/10.1109/MSP.2008.930649.